Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Uživatelská příručka Strana 63

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 328
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 62
Configuration Management Function
1-41
Configuration Management Function
This section describes how to deal with security threats using the Configuration Management function.
Configuration Management Function Usage Model
The following figure shows a typical usage model for the Configuration Management function.
Figure 1-3 Configuration Management Function Usage Model
The Configuration Management function stores operations in the Interstage Management Console
internally. For this reason, users do not need to be aware of the configuration of the configuration
management function. This chapter explains the settings information for the Environment Settings
window in a repository that is available to the system administrator, and also explains security breach
threats.
Resources to be Protected
This section explains the resources that should be protected for the repository that is managed by the
Configuration Management function.
Functions to be Protected
The following functions and procedures should be protected:
Operations using the Interstage Management Console
Zobrazit stránku 62
1 2 ... 58 59 60 61 62 63 64 65 66 67 68 ... 327 328

Komentáře k této Příručce

Žádné komentáře